US20070174501A1 - System and method for managing a data transfer channel between communication devices - Google Patents
System and method for managing a data transfer channel between communication devices Download PDFInfo
- Publication number
- US20070174501A1 US20070174501A1 US11/563,152 US56315206A US2007174501A1 US 20070174501 A1 US20070174501 A1 US 20070174501A1 US 56315206 A US56315206 A US 56315206A US 2007174501 A1 US2007174501 A1 US 2007174501A1
- Authority
- US
- United States
- Prior art keywords
- data
- reassembled
- data transfer
- communication devices
- transfer channel
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0245—Filtering by information in the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/104—Grouping of entities
Definitions
- the present invention generally relates to systems and methods for managing data, and more particularly to a system and method for managing a data transfer channel between communication devices.
- a relatively secure and simple method is to cut off data links between communication devices, so as to prevent confidential data from spreading by the Internet, and prevent an unauthorized operator from accessing the sensitive data.
- transmitting/receiving relevant information carried by data transfer channels via the Internet is needed to a person/an enterprise in a business.
- the secure and simple method usually shows that the loss outweighs the gain if a communication device is forbidden from connecting with another via the Internet.
- a system for managing a data transfer channel between communication devices in accordance with a preferred embodiment includes a storage device and a data manager.
- the storage device is configured for storing security definitions.
- the data manager includes a monitoring module, an analyzing module, an intercepting module, a data processing module, and a data controlling module.
- the monitoring module is configured for monitoring the data transfer channel for a data transfer.
- the analyzing module is configured for waiting for the data transfer by communicating with the monitoring module, and for detecting whether reassembled data include sensitive/confidential data corresponding to the security definitions.
- the intercepting module is configured for intercepting data packets of the data transfer channel if the data transfer is detected.
- the data processing module is configured for reassembling intercepted data packets into the reassembled data, and for formatting the reassembled data into the intercepted data packets if the reassembled data do not comprise sensitive/confidential data.
- the data controlling module is configured for releasing the intercepted data packets if the reassembled data do not comprise sensitive/confidential data, and for preventing detected data from transferring through the data transfer channel to the communication devices if the reassembled data comprise sensitive/confidential data.
- a method for managing a data transfer channel between communication devices includes the steps of: monitoring the data transfer channel for a data transfer; intercepting data packets of the data transfer channel if the data transfer is detected; reassembling intercepted data packets into reassembled data; detecting whether reassembled data include sensitive/confidential data corresponding to the security definitions; preventing detected data from transferring through the data transfer channel to the communication devices if the reassembled data comprise sensitive/confidential data; and formatting the reassembled data into the intercepted data packets and releasing the intercepted data packets, if the reassembled data do not comprise sensitive/confidential data.
- FIG. 1 is a schematic diagram of a hardware configuration of a system for managing a data transfer channel between communication devices in accordance with a preferred embodiment
- FIG. 2 is a schematic diagram of main function sub-modules of a data manager of FIG. 1 ;
- FIG. 3 is a flowchart of a method for managing a data transfer channel between communication devices in accordance with a preferred embodiment.
- FIG. 1 is a schematic diagram of a hardware configuration of a system for managing a data transfer channel between communication devices (hereinafter, “the system”) in accordance with a preferred embodiment.
- the system typically includes a plurality of communication devices, such as a work computer 5 , and a plurality of communication devices 4 (only two shown) connected to the work computer 5 via the Internet 3 .
- the work computer 5 may include a communication interface 1 , a managing interface 2 connected with the communication interface 1 .
- a data transfer can be performed from one of above-mentioned communication devices such as the work computer 5 , to another of above-mentioned communication devices such as the communication devices 4 through the data transfer channel.
- Both the work computer 5 and the communication devices 4 are configured (i.e., structured and arranged) for transmitting data carried by the data transfer channel, and the data transfer can be performed specifically between the communication interface 1 and the communication devices 4 through the data transfer channel.
- Both the work computer 5 and the communication devices 4 can be client computers, personal digital assistants (PDAs), or the like.
- the communication interface 1 includes a plurality of data communicating tools 10 such as, Microsoft Network Messenger (shown with MSN.exe), Microsoft Internet Explorer (shown with explorer.exe), and Lotus Notes (shown with Notes.exe), for transmitting/receiving data carried by the data transfer channel between the data communicating tools 10 and the communication devices 4 .
- the managing interface 2 includes a storage device 22 configured for storing security definitions predefined by a person, and a data manager 20 connected with the storage device 22 , the communication interface 1 and the communication devices 4 .
- the data manager 20 is configured for managing the data transfer channel between the communication interface 1 and the communication devices 4 by corresponding to the predefined security definitions.
- the security definitions are used for specifying sensitive/confidential data that is not permitted to be transferred between the communication interface 1 and the communication devices 4 .
- FIG. 2 is a schematic diagram of main function sub-modules of the data manager 20 .
- the data manager 20 typically includes a monitoring module 200 , an analyzing module 202 , an intercepting module 204 , a data processing module 206 , and a data controlling module 208 .
- the monitoring module 200 is configured for monitoring the data transfer channel between the communication interface 1 and the communication devices 4 for a data transfer. It is generally known that a data transfer contained a destination address is performed when the work computer 5 is communicating with a communication device 4 .
- the address of the data communicating tool 10 is the destination address if the data transfer is from the communication device 4 to the data communicating tool 10 through the data transfer channel. Otherwise, the address of the communication device 4 is the destination address if the data transfer is from the data communicating tool 10 to the communication device 4 through the data transfer channel.
- the analyzing module 202 is configured for waiting for the data transfer by communicating with the monitoring module 200 , and for detecting whether reassembled data include sensitive/confidential data corresponding to the predefined security definitions that specifies sensitive/confidential data not permitted to be transferred.
- the intercepting module 204 is configured for intercepting data packets of the data transfer channel monitored by the monitoring module 200 , and for retrieving the predefined security definitions from the storage device 22 .
- the data processing module 206 is configured for reassembling intercepted data packets into the reassembled data, and for formatting the reassembled data into the intercepted data packets if the reassembled data do not include sensitive/confidential data.
- the data controlling module 208 is configured for releasing the intercepted data packets such that the monitored data transfer channel connection is allowed to transfer the intercepted data packets to the communication device 4 or the data communicating tool 10 according to destination address, if the reassembled data do not include sensitive/confidential data.
- the data controlling module 208 is further configured for preventing detected data from transferring through the monitored data transfer channel to the communication device 4 or the data communicating tool 10 , if the reassembled data include sensitive/confidential data.
- FIG. 3 is a flowchart of a method for managing a data transfer channel between communication devices by implementing the system as described above.
- the monitoring module 200 monitors the data transfer channel between the communication interface 1 and the communication devices 4 for a data transfer.
- step S 22 the analyzing module 202 waits for the data transfer by communicating with the monitoring module 200 .
- step S 24 the intercepting module 204 intercepts data packets of the monitored data transfer channel, and the data processing module 206 reassembles data packets intercepted into reassembled data.
- step S 26 the intercepting module 204 retrieves the security definitions from the storage device 22 .
- step S 28 the analyzing module 202 detects whether the reassembled data include sensitive/confidential data corresponding to the predefined security definitions that specifies sensitive/confidential data not permitted to be transferred.
- step S 30 the data processing module 206 formats the reassembled data into the intercepted data packets, and the data controlling module 208 releases the intercepted data packets such that the monitored data transfer channel connection is allowed to transfer the intercepted data packets to the communication device 4 or the data communicating tool 10 according to destination address.
- step S 32 the data controlling module 208 prevents detected data from transferring through the monitored data transfer channel to the communication device 4 or the data communicating tool 10 .
Abstract
A method for managing a data transfer channel between communication devices includes: monitoring the data transfer channel for a data transfer; intercepting data packets of the data transfer channel if the data transfer is detected; reassembling intercepted data packets into reassembled data; detecting whether reassembled data include sensitive/confidential data corresponding to the security definitions; preventing detected data from transferring through the data transfer channel to the communication devices if the reassembled data comprise sensitive/confidential data; and formatting the reassembled data into the intercepted data packets and releasing the intercepted data packets, if the reassembled data do not comprise sensitive/confidential data. A related system is also disclosed.
Description
- 1. Field of the Invention
- The present invention generally relates to systems and methods for managing data, and more particularly to a system and method for managing a data transfer channel between communication devices.
- 2. Description of Related Art
- With the continual technology advancement of computer servers and the Internet, transmitting/receiving relevant information via the Internet has become an important task for more and more people. Usually information carried by a data transfer channel is exchanged between communication devices such as a work computer, a client computer, a personal digital assistant (PDA), and the combination thereof. However, it is not secure if the information carried by the data transfer channel includes sensitive/confidential data and is exchanged between communication devices.
- A relatively secure and simple method is to cut off data links between communication devices, so as to prevent confidential data from spreading by the Internet, and prevent an unauthorized operator from accessing the sensitive data. However, transmitting/receiving relevant information carried by data transfer channels via the Internet is needed to a person/an enterprise in a business. The secure and simple method usually shows that the loss outweighs the gain if a communication device is forbidden from connecting with another via the Internet.
- What is needed, therefore, is a system and method that manages a data transfer channel between communication devices, that can prevent confidential data from spreading by the Internet, and prevent an authorized operator from accessing sensitive data via the Internet.
- A system for managing a data transfer channel between communication devices in accordance with a preferred embodiment includes a storage device and a data manager. The storage device is configured for storing security definitions. The data manager includes a monitoring module, an analyzing module, an intercepting module, a data processing module, and a data controlling module. The monitoring module is configured for monitoring the data transfer channel for a data transfer. The analyzing module is configured for waiting for the data transfer by communicating with the monitoring module, and for detecting whether reassembled data include sensitive/confidential data corresponding to the security definitions. The intercepting module is configured for intercepting data packets of the data transfer channel if the data transfer is detected. The data processing module is configured for reassembling intercepted data packets into the reassembled data, and for formatting the reassembled data into the intercepted data packets if the reassembled data do not comprise sensitive/confidential data. The data controlling module is configured for releasing the intercepted data packets if the reassembled data do not comprise sensitive/confidential data, and for preventing detected data from transferring through the data transfer channel to the communication devices if the reassembled data comprise sensitive/confidential data.
- A method for managing a data transfer channel between communication devices in accordance with a preferred embodiment includes the steps of: monitoring the data transfer channel for a data transfer; intercepting data packets of the data transfer channel if the data transfer is detected; reassembling intercepted data packets into reassembled data; detecting whether reassembled data include sensitive/confidential data corresponding to the security definitions; preventing detected data from transferring through the data transfer channel to the communication devices if the reassembled data comprise sensitive/confidential data; and formatting the reassembled data into the intercepted data packets and releasing the intercepted data packets, if the reassembled data do not comprise sensitive/confidential data.
- Other advantages and novel features of the present invention will become more apparent from the following detailed description of preferred embodiments when taken in conjunction with the accompanying drawings.
-
FIG. 1 is a schematic diagram of a hardware configuration of a system for managing a data transfer channel between communication devices in accordance with a preferred embodiment; -
FIG. 2 is a schematic diagram of main function sub-modules of a data manager ofFIG. 1 ; and -
FIG. 3 is a flowchart of a method for managing a data transfer channel between communication devices in accordance with a preferred embodiment. -
FIG. 1 is a schematic diagram of a hardware configuration of a system for managing a data transfer channel between communication devices (hereinafter, “the system”) in accordance with a preferred embodiment. The system typically includes a plurality of communication devices, such as awork computer 5, and a plurality of communication devices 4 (only two shown) connected to thework computer 5 via the Internet 3. Thework computer 5 may include acommunication interface 1, a managinginterface 2 connected with thecommunication interface 1. A data transfer can be performed from one of above-mentioned communication devices such as thework computer 5, to another of above-mentioned communication devices such as thecommunication devices 4 through the data transfer channel. Both thework computer 5 and thecommunication devices 4 are configured (i.e., structured and arranged) for transmitting data carried by the data transfer channel, and the data transfer can be performed specifically between thecommunication interface 1 and thecommunication devices 4 through the data transfer channel. Both thework computer 5 and thecommunication devices 4 can be client computers, personal digital assistants (PDAs), or the like. - The
communication interface 1 includes a plurality ofdata communicating tools 10 such as, Microsoft Network Messenger (shown with MSN.exe), Microsoft Internet Explorer (shown with explorer.exe), and Lotus Notes (shown with Notes.exe), for transmitting/receiving data carried by the data transfer channel between thedata communicating tools 10 and thecommunication devices 4. The managinginterface 2 includes astorage device 22 configured for storing security definitions predefined by a person, and adata manager 20 connected with thestorage device 22, thecommunication interface 1 and thecommunication devices 4. Thedata manager 20 is configured for managing the data transfer channel between thecommunication interface 1 and thecommunication devices 4 by corresponding to the predefined security definitions. The security definitions are used for specifying sensitive/confidential data that is not permitted to be transferred between thecommunication interface 1 and thecommunication devices 4. -
FIG. 2 is a schematic diagram of main function sub-modules of thedata manager 20. Thedata manager 20 typically includes amonitoring module 200, ananalyzing module 202, anintercepting module 204, adata processing module 206, and adata controlling module 208. - The
monitoring module 200 is configured for monitoring the data transfer channel between thecommunication interface 1 and thecommunication devices 4 for a data transfer. It is generally known that a data transfer contained a destination address is performed when thework computer 5 is communicating with acommunication device 4. The address of thedata communicating tool 10 is the destination address if the data transfer is from thecommunication device 4 to thedata communicating tool 10 through the data transfer channel. Otherwise, the address of thecommunication device 4 is the destination address if the data transfer is from thedata communicating tool 10 to thecommunication device 4 through the data transfer channel. - The analyzing
module 202 is configured for waiting for the data transfer by communicating with themonitoring module 200, and for detecting whether reassembled data include sensitive/confidential data corresponding to the predefined security definitions that specifies sensitive/confidential data not permitted to be transferred. - The
intercepting module 204 is configured for intercepting data packets of the data transfer channel monitored by themonitoring module 200, and for retrieving the predefined security definitions from thestorage device 22. - The
data processing module 206 is configured for reassembling intercepted data packets into the reassembled data, and for formatting the reassembled data into the intercepted data packets if the reassembled data do not include sensitive/confidential data. - The
data controlling module 208 is configured for releasing the intercepted data packets such that the monitored data transfer channel connection is allowed to transfer the intercepted data packets to thecommunication device 4 or thedata communicating tool 10 according to destination address, if the reassembled data do not include sensitive/confidential data. Thedata controlling module 208 is further configured for preventing detected data from transferring through the monitored data transfer channel to thecommunication device 4 or thedata communicating tool 10, if the reassembled data include sensitive/confidential data. -
FIG. 3 is a flowchart of a method for managing a data transfer channel between communication devices by implementing the system as described above. In step S20, Themonitoring module 200 monitors the data transfer channel between thecommunication interface 1 and thecommunication devices 4 for a data transfer. - In step S22, the analyzing
module 202 waits for the data transfer by communicating with themonitoring module 200. - If the data transfer is not detected by the
monitoring module 200, the procedure returns to step S20 as described above. Otherwise, if the data transfer is detected, in step S24, theintercepting module 204 intercepts data packets of the monitored data transfer channel, and thedata processing module 206 reassembles data packets intercepted into reassembled data. - In step S26, the
intercepting module 204 retrieves the security definitions from thestorage device 22. In step S28, theanalyzing module 202 detects whether the reassembled data include sensitive/confidential data corresponding to the predefined security definitions that specifies sensitive/confidential data not permitted to be transferred. - If the reassembled data do not include sensitive/confidential data, in step S30, the
data processing module 206 formats the reassembled data into the intercepted data packets, and thedata controlling module 208 releases the intercepted data packets such that the monitored data transfer channel connection is allowed to transfer the intercepted data packets to thecommunication device 4 or thedata communicating tool 10 according to destination address. - Otherwise, if the reassembled data include sensitive/confidential data, in step S32, the
data controlling module 208 prevents detected data from transferring through the monitored data transfer channel to thecommunication device 4 or thedata communicating tool 10. - It should be emphasized that the above-described embodiments of the preferred embodiments, particularly, any “preferred” embodiments, are merely possible examples of implementations, merely set forth for a clear understanding of the principles of the invention. Many variations and modifications may be made to the above-described preferred embodiment(s) without departing substantially from the spirit and principles of the invention. All such modifications and variations are intended to be included herein within the scope of this disclosure and the above-described preferred embodiment(s) and protected by the following claims.
Claims (6)
1. A system for managing a data transfer channel between communication devices, the system comprising:
a storage device configured for storing security definitions; and
a data manager comprising:
a monitoring module configured for monitoring the data transfer channel for a data transfer;
an analyzing module configured for waiting for the data transfer by communicating with the monitoring module, and for detecting whether reassembled data include sensitive/confidential data corresponding to the security definitions;
an intercepting module configured for intercepting data packets of the data transfer channel if the data transfer is detected;
a data processing module configured for reassembling intercepted data packets into the reassembled data, and for formatting the reassembled data into the intercepted data packets if the reassembled data do not comprise sensitive/confidential data; and
a data controlling module configured for releasing the intercepted data packets if the reassembled data do not comprise sensitive/confidential data, and for preventing detected data from transferring through the data transfer channel to the communication devices if the reassembled data comprise sensitive/confidential data.
2. The system as claimed in claim 1 , wherein the security definitions are used for specifying sensitive/confidential data that is not permitted to be transferred between the communication devices.
3. The system as claimed in claim 1 , wherein the communication devices are selected from the group consisting of computers and personal digital assistants (PDAs).
4. A method for managing a data transfer channel between communication devices, the method comprising the steps of:
monitoring the data transfer channel for a data transfer;
intercepting data packets of the data transfer channel if the data transfer is detected;
reassembling intercepted data packets into reassembled data;
detecting whether reassembled data include sensitive/confidential data corresponding to the security definitions;
preventing detected data from transferring through the data transfer channel to the communication devices if the reassembled data comprise sensitive/confidential data; and
formatting the reassembled data into the intercepted data packets and releasing the intercepted data packets, if the reassembled data do not comprise sensitive/confidential data.
5. The method as claimed in claim 4 , wherein the predefined security definitions are used for specifying sensitive/confidential data that is not permitted to be transferred between the communication devices.
6. The method as claimed in claim 4 , wherein the communication devices are selected from the group consisting of computers and personal digital assistants (PDAs).
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200610032816.8 | 2006-01-06 | ||
CNA2006100328168A CN1996901A (en) | 2006-01-06 | 2006-01-06 | Communication monitoring system and method of the network data |
Publications (1)
Publication Number | Publication Date |
---|---|
US20070174501A1 true US20070174501A1 (en) | 2007-07-26 |
Family
ID=38251849
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/563,152 Abandoned US20070174501A1 (en) | 2006-01-06 | 2006-11-25 | System and method for managing a data transfer channel between communication devices |
Country Status (2)
Country | Link |
---|---|
US (1) | US20070174501A1 (en) |
CN (1) | CN1996901A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100205300A1 (en) * | 2007-10-25 | 2010-08-12 | Fujitsu Limited | Routing method |
US8839425B1 (en) * | 2013-05-17 | 2014-09-16 | Iboss, Inc. | Destination-specific network management |
US9195669B2 (en) | 2014-02-26 | 2015-11-24 | Iboss, Inc. | Detecting and managing abnormal data behavior |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6765505B1 (en) * | 1999-12-03 | 2004-07-20 | Fulcrum Laboratories Ag | Method for data transfer |
US20040181690A1 (en) * | 1999-05-06 | 2004-09-16 | Rothermel Peter M. | Managing multiple network security devices from a manager device |
US20070160198A1 (en) * | 2005-11-18 | 2007-07-12 | Security First Corporation | Secure data parser method and system |
US7260724B1 (en) * | 1999-09-20 | 2007-08-21 | Security First Corporation | Context sensitive dynamic authentication in a cryptographic system |
US7350227B2 (en) * | 2005-04-26 | 2008-03-25 | Cisco Technology, Inc. | Cryptographic peer discovery, authentication, and authorization for on-path signaling |
US20090044263A1 (en) * | 2004-09-02 | 2009-02-12 | International Business Machines Corporation | System and Method for On-Demand Dynamic Control of Security Policies/Rules by a Client Computing Device |
US20090077648A1 (en) * | 2003-06-06 | 2009-03-19 | Microsoft Corporation | Method for managing network filter based policies |
-
2006
- 2006-01-06 CN CNA2006100328168A patent/CN1996901A/en active Pending
- 2006-11-25 US US11/563,152 patent/US20070174501A1/en not_active Abandoned
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040181690A1 (en) * | 1999-05-06 | 2004-09-16 | Rothermel Peter M. | Managing multiple network security devices from a manager device |
US7260724B1 (en) * | 1999-09-20 | 2007-08-21 | Security First Corporation | Context sensitive dynamic authentication in a cryptographic system |
US6765505B1 (en) * | 1999-12-03 | 2004-07-20 | Fulcrum Laboratories Ag | Method for data transfer |
US20090077648A1 (en) * | 2003-06-06 | 2009-03-19 | Microsoft Corporation | Method for managing network filter based policies |
US20090044263A1 (en) * | 2004-09-02 | 2009-02-12 | International Business Machines Corporation | System and Method for On-Demand Dynamic Control of Security Policies/Rules by a Client Computing Device |
US7350227B2 (en) * | 2005-04-26 | 2008-03-25 | Cisco Technology, Inc. | Cryptographic peer discovery, authentication, and authorization for on-path signaling |
US20070160198A1 (en) * | 2005-11-18 | 2007-07-12 | Security First Corporation | Secure data parser method and system |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100205300A1 (en) * | 2007-10-25 | 2010-08-12 | Fujitsu Limited | Routing method |
US8626915B2 (en) * | 2007-10-25 | 2014-01-07 | Fujitsu Limited | Routing method |
US8898248B2 (en) | 2007-10-25 | 2014-11-25 | Fujitsu Limited | Routing method |
US8839425B1 (en) * | 2013-05-17 | 2014-09-16 | Iboss, Inc. | Destination-specific network management |
US9195669B2 (en) | 2014-02-26 | 2015-11-24 | Iboss, Inc. | Detecting and managing abnormal data behavior |
US9794291B2 (en) | 2014-02-26 | 2017-10-17 | Iboss, Inc. | Detecting and managing abnormal data behavior |
US10057296B2 (en) | 2014-02-26 | 2018-08-21 | Iboss, Inc. | Detecting and managing abnormal data behavior |
Also Published As
Publication number | Publication date |
---|---|
CN1996901A (en) | 2007-07-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11552918B2 (en) | System and method of a relay server for managing communications and notification between a mobile device and application server | |
US10237282B2 (en) | Data leak protection | |
US9734308B2 (en) | Privilege management and revocation | |
US9516062B2 (en) | System and method for determining and using local reputations of users and hosts to protect information in a network environment | |
US8286242B2 (en) | System and method for providing network security | |
US8407763B2 (en) | Secure network interface device | |
US7958557B2 (en) | Determining a source of malicious computer element in a computer network | |
US9197419B1 (en) | Security system for data stored in the cloud | |
EP1854243B1 (en) | Mapping an encrypted https network packet to a specific url name and other data without decryption outside of a secure web server | |
US11880490B2 (en) | Context-based access control and revocation for data governance and loss mitigation | |
US20110083190A1 (en) | System and method for data leakage prevention | |
US8990893B2 (en) | Enterprise application session control and monitoring in a large distributed environment | |
WO2006004785A1 (en) | Systems and methods for enhanced electronic asset protection | |
US7613828B2 (en) | Store-and-forward messaging channel for occasionally connected mobile applications | |
US7333430B2 (en) | Systems and methods for passing network traffic data | |
US20220131876A1 (en) | Method for securely communicating email content between a sender and a recipient | |
US20100169484A1 (en) | Unauthorized Communication Program Regulation System and Associated Program | |
CN103441923A (en) | Method and device for transmitting safety file based on network application software | |
US7665136B1 (en) | Method and apparatus for detecting hidden network communication channels of rootkit tools | |
US20070174501A1 (en) | System and method for managing a data transfer channel between communication devices | |
KR100773416B1 (en) | Method and system for controlling network traffic of p2p and instant messenger | |
KR100748113B1 (en) | Network device for preventing leakage of secret data and method thereof | |
Balinsky et al. | System call interception framework for data leak prevention | |
US20200389435A1 (en) | Auditing smart bits | |
JP4571882B2 (en) | E-mail filtering method and filtering system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: HON HAI PRECISION INDUSTRY CO., LTD., TAIWAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LIN, BOR-CHUAN;WANG, JUN-FENG;LUO, CAI-YANG;AND OTHERS;REEL/FRAME:018550/0026 Effective date: 20061117 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |